COMMITMENT TO CONFIDENTIALITY: YOUR CODE IS YOUR ASSET. WE TREAT ALL SOURCE CODE, API KEYS, AND SERVER CREDENTIALS AS "STRICTLY CONFIDENTIAL TRADE SECRETS" UNDER WYOMING LAW.
At Sistemova Global LLC (operating as software.sistemova.com), we recognize that engineering data is the lifeblood of modern business. This Privacy Policy outlines how we collect, use, and zealously guard your proprietary information.
1. Information We Collect
To deliver high-performance software engineering services, we collect specific technical and business data:
1.1 Proprietary Technical Data
- Source Code & Repositories: Access to GitHub/GitLab repositories for code review or development.
- Server Credentials: SSH keys, FTP details, and API tokens required for deployment.
- Design Assets: CAD files, Adobe XD/Figma prototypes, and PCB schematics (Gerber/BOM).
1.2 Business Information
- Identity Data: Name, Company Name, Tax ID, and authorized representative details.
- Communication Data: Project specifications, feature requirements, and email correspondence.
2. How We Use Your Information
Your data is used strictly for the purpose of fulfilling the Engineering Service Agreement:
- To develop, test, and deploy software applications.
- To design and prototype electronic hardware (PCB).
- To maintain server infrastructure and ensure uptime.
- To process payments and issue legally compliant invoices.
3. Intellectual Property (IP) Protection
We differentiate ourselves through our strict adherence to IP protection standards.
- Non-Disclosure: All employees and contractors of Sistemova Global LLC are bound by strict Non-Disclosure Agreements (NDAs).
- Ownership: Upon full payment, all custom source code and design files created for the client become the exclusive property of the Client. Sistemova Global LLC retains no claim to your IP.
- Data Isolation: Client projects are developed in isolated environments (Sandboxes) to prevent cross-contamination of code.
4. Third-Party Sharing
We do not sell, rent, or trade your data. Data is shared only with essential infrastructure providers:
- Hosting Providers: (e.g., AWS, DigitalOcean) for server deployment.
- Payment Processors: (e.g., Stripe) for secure billing.
- Legal Compliance: If compelled by a court order under the jurisdiction of the State of Wyoming or US Federal Law.
5. Data Retention & Security
We implement industry-standard encryption (TLS 1.3) for data in transit and AES-256 for data at rest.
Unless a maintenance contract is active, we retain project files for 1 year after delivery for backup purposes, after which they are securely purged from our systems.
6. Your Rights
Under applicable laws, you maintain the right to request access to, correction of, or deletion of your personal and proprietary data stored on our servers.